ClamAV < 0.94.2 cli_check_jpeg_exploit() Malformed JPEG File DoS

Medium Nessus Plugin ID 35009


The remote antivirus service is vulnerable to a denial of service attack.


According to its version, the clamd antivirus daemon on the remote host is earlier than 0.94.2. There is a recursive stack overflow involving the JPEG parsing code in such versions. A remote attacker may be able to leverage this issue to cause the application to recursively scan a specially crafted JPEG, which will eventually cause it to crash.


Upgrade to ClamAV 0.94.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 35009

File Name: clamav_0_94_2.nasl

Version: $Revision: 1.15 $

Type: remote

Published: 2008/12/03

Modified: 2014/05/25

Dependencies: 11153

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:clamav:clamav

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-5314

BID: 32555

OSVDB: 50363

Secunia: 32926

CWE: 399